You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/threat-model.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -386,7 +386,7 @@ Notable threats to the system that could impact assets.
386
386
387
387
**Assets Affected**: Operational Sustainability, High Throughput
388
388
389
-
#### T?: Honey Pot Contract
389
+
#### T12: Honey Pot Contract
390
390
391
391
**Description**: An attacker deliberately makes ADA available on-chain so anyone races to claim it with the goal of producing many conflicting transactions. This is very similar to T1, but uses cryptocurrency instead of network resources.
392
392
@@ -410,7 +410,7 @@ Notable threats to the system that could impact assets.
410
410
411
411
**Assets Affected**: High Throughput, Operational Sustainability
412
412
413
-
#### T?: Delayed Praos Blocks
413
+
#### T13: Delayed Praos Blocks
414
414
415
415
> [!WARN]
416
416
> Is this a threat or rather part of the Blockchain Safety asset?
@@ -422,7 +422,7 @@ Notable threats to the system that could impact assets.
422
422
423
423
**Assets Affected**: Blockchain Safety
424
424
425
-
#### T?: Excessive Chain Growth
425
+
#### T14: Excessive Chain Growth
426
426
427
427
> [!WARN]
428
428
> TODO and how do we describe threats that are not attacks?
0 commit comments